How a Potential Attacker Sees You
Our expert analysis of deep level OSINT (Open-Source Intelligence) serves as the basis for the four main simulated attack vectors: Vishing, Phishing, SMiShing, & Impersonation. These are customized thorough investigations providing actionable reporting and guidance for remediation.
Teaming
Deploy professionally trained SE Team agents for on-site impersonation day or night. Point-in-time testing of vendor/visitor access policies and physical perimeter. This full scope program is multi layered and may include badge cloning, credential harvesting, and network control.
Risk Assessment & Adversarial Simulation
This “human vulnerability scan” evaluates the security posture of your highest value employees or company as a whole.
Red Team Support
Augment your internal red team with trained and professional social engineers. We will work hand-in-hand with internal teams to test the human element of your network through remote consulting, feet-on-the-ground, and/or initial access testing through social engineering vectors.
Related Articles
April 30, 2021
Aftermath of a Social Engineering Engagement
You have heard all the stories. Social engineers (SEs) being held at gunpoint,…
July 22, 2020
Managing Your Vishing Defenses at Home
During the past 6 years at Social-Engineer, LLC (SECOM) we’ve made over 45,000…
February 20, 2019
Have You Ever Received One of Those Calls?
What Is Vishing? We define vishing as the “practice of eliciting information or…
January 22, 2019
Assess Your Risks
We talk a lot about phishing, vishing, smishing, and impersonation here at…
December 19, 2018
In 2019, Test Impersonation Attacks
At SECOM, we perform many forms of social engineering attacks, from phishing to…
November 19, 2018
Not All Phishing Programs Are Created Equal
In today’s corporate world, security awareness training should be a common…